At your office, like at home, security measures are a must to avoid theft. The same goes for your data, your personal information and that of your clients, which are worth their weight in gold for cybercriminals.
Criminals can attack you or your organization in different ways. A cyberattack can target a computer, a server, peripherals or mobile communication devices like smartphones or tablets. The goal of such attacks is to:
- Destroy them or damage them
- Take control of them to make illegitimate transactions
- Steal your personal data or those of your business or your clients
Your judgment is your best prevention tool. Hackers often manage to infiltrate themselves thanks to an appealing email or by exploiting the weaknesses of your security measures or your IT systems. If you have doubts about some information, a request for help or an unusual financial offer, it may be an attempted cyberattack.
Don’t give in to curiosity!
- Never open a suspicious email or one of unknown origin.
- Never click on a suspicious attachment or a hypertext link in an unsolicited email. Before opening email attachments, make sure you know what they are about.
- If a message seems too good to be true, it’s probably a scam.
You can enhance the security of your personal information by following some basic principles. They apply to both the home and the office.
- Never disclose your passwords to anyone.
- Create passwords that are difficult to guess: with numbers, uppercase and lowercase letters, and special characters.
- Avoid using a USB key or a personal external disk for professional purposes.
- Always lock your workstation when you are away from your desk, even briefly.
- Report any suspicious incident to the IT security manager in your organization.
If you use a computer in a public place (such as an Internet café or an open-concept office), make sure nobody can see your password when you type. Be sure to end the session when you have finished.
- Only visit reliable sites, i.e. those of recognized organizations.
- Only conduct transactions on secure sites. Secure sites have an Internet address starting with “https” or they have a lock icon on the page.
- Control the dissemination of your personal information.
Your cybersecurity first!
Threats are constantly evolving. Hackers and fraudsters have more than one trick in their bag. Whenever there is an opportunity, there are one or more potential victims. Even if you think you don’t have much to lose, if your equipment is not up to date or is obsolete, cybercriminals can use it as an access point to target other organizations and to steal valuable data.
By adopting good habits and following some basic principles, you can really enhance your cybersecurity and that of others. And above all, be alert and keep abreast of the latest cybersecurity information.